Method of authenticating a terminal in a transaction execution system
First Claim
1. A method of authenticating a terminal in a transaction execution system to a user, said method comprising the steps of:
- receiving account information in said terminal;
contacting through a communication line a host associated with an institution that issued said account information;
sending at least a portion of said account information from said terminal to said host;
sending a personal security phrase, corresponding to said account, from said host to said terminal; and
communicating to said user at said terminal a message incorporating said personal security phrase, where the aforementioned steps occur prior to said user'"'"'s entering any secret or confidential information into said terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides for a method of authenticating to a user or customer a terminal, such as an automatic teller machine, in a transaction execution system. The terminal is authenticated by a central host using cryptographic techniques, and a personal security phrase is sent from the host to the terminal. A message, incorporating the personal security phrase, is communicated to the customer by the terminal, thereby indicating that the terminal is legitimate. The terminal is authenticated to the customer prior to his entering any secret or confidential information, such as a personal identification number, into the terminal.
-
Citations
23 Claims
-
1. A method of authenticating a terminal in a transaction execution system to a user, said method comprising the steps of:
-
receiving account information in said terminal; contacting through a communication line a host associated with an institution that issued said account information; sending at least a portion of said account information from said terminal to said host; sending a personal security phrase, corresponding to said account, from said host to said terminal; and communicating to said user at said terminal a message incorporating said personal security phrase, where the aforementioned steps occur prior to said user'"'"'s entering any secret or confidential information into said terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification